What has to be taken into consideration when configuring Management HA?
What has to be taken into consideration when configuring Management HA?A . The Database revisions will not be synchronized between the management servers B. SmartConsole must be closed prior to synchronized changes in the objects database C. If you wanted to use Full Connectivity Upgrade, you must change the Implied...
Which two of these Check Point Protocols are used by SmartEvent Processes?
ESTION NO: 10 Which two of these Check Point Protocols are used by SmartEvent Processes?A . ELA and CPD B. FWD and LEA C. FWD and CPLOG D. ELA and CPLOGView AnswerAnswer: D
In R81 spoofing is defined as a method of:
In R81 spoofing is defined as a method of:A . Disguising an illegal IP address behind an authorized IP address through Port Address Translation. B. Hiding your firewall from unauthorized users. C. Detecting people using false or wrong authentication logins D. Making packets appear as if they come from an...
Which application would you use?
You want to gather and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?A . SmartEvent Client Info B. SecuRemote C. Check Point Protect D. Check Point Capsule CloudView AnswerAnswer: C
Advanced Security Checkups can be easily conducted within:
Advanced Security Checkups can be easily conducted within:A . Reports B. Advanced C. Checkups D. Views E. SummaryView AnswerAnswer: A
Session unique identifiers are passed to the web api using which http header option?
Session unique identifiers are passed to the web api using which http header option?A . X-chkp-sid B. Accept-Charset C. Proxy-Authorization D. ApplicationView AnswerAnswer: C
fwssd is a child process of which of the following Check Point daemons?
fwssd is a child process of which of the following Check Point daemons?A . fwd B. cpwd C. fwm D. cpdView AnswerAnswer: A
What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?
What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?A . Anti-Bot is the only countermeasure against unknown malware B. Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control Centers C. Anti-Bot is the only...
Which command would disable a Cluster Member permanently?
Which command would disable a Cluster Member permanently?A . clusterXL_admin down B. cphaprob_admin down C. clusterXL_admin down-p D. set clusterXL down-pView AnswerAnswer: C
Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?
Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?A . Check Point Remote User B. Check Point Capsule Workspace C. Check Point Mobile Web Portal D. Check Point Capsule RemoteView AnswerAnswer: C